Skip to content

deps: bump golang.org/x/net to v0.54.0 to fix CVE-2026-27141#4481

Merged
ValClarkson merged 2 commits into
CrunchyData:mainfrom
ValClarkson:ci/bump-x-net-cve
May 13, 2026
Merged

deps: bump golang.org/x/net to v0.54.0 to fix CVE-2026-27141#4481
ValClarkson merged 2 commits into
CrunchyData:mainfrom
ValClarkson:ci/bump-x-net-cve

Conversation

@ValClarkson
Copy link
Copy Markdown
Contributor

govulncheck reports DoS vulnerabilities in golang.org/x/net/http2 (http2.Transport.RoundTrip, NewClientConn, unencryptedTransport.RoundTrip, noDialH2RoundTripper.RoundTrip) that are reached via Kubernetes' discovery client. The fix is in x/net v0.51.0+ for CVE-2026-27141 and later versions for follow-on HTTP/2 hardening (e.g. CVE-2026-33814 fixes). Bumping x/net to v0.54.0 (the latest release as of Apr 2026) also pulls in the matching versions of the other golang.org/x/* dependencies it relies on (crypto, mod, sync, sys, term, text, tools). All are minor bumps within the x/ family and contain no API breakage.

Checklist:

  • Have you added an explanation of what your changes do and why you'd like them to be included?
  • Have you updated or added documentation for the change, as applicable?
  • Have you tested your changes on all related environments with successful results, as applicable?
    • Have you added automated tests?

Type of Changes:

  • New feature
  • Bug fix
  • Documentation
  • Testing enhancement
  • Other

What is the current behavior (link to any open issues here)?

What is the new behavior (if this is a feature change)?

  • Breaking change (fix or feature that would cause existing functionality to change)

Other Information:

govulncheck reports DoS vulnerabilities in golang.org/x/net/http2
(http2.Transport.RoundTrip, NewClientConn, unencryptedTransport.RoundTrip,
noDialH2RoundTripper.RoundTrip) that are reached via Kubernetes' discovery
client. The fix is in x/net v0.51.0+ for CVE-2026-27141 and later versions
for follow-on HTTP/2 hardening (e.g. CVE-2026-33814 fixes).

Bumping x/net to v0.54.0 (the latest release as of Apr 2026) also pulls in
the matching versions of the other golang.org/x/* dependencies it relies on
(crypto, mod, sync, sys, term, text, tools). All are minor bumps within the
x/ family and contain no API breakage.

Rebased on top of CrunchyData#4479 (Kubernetes 0.36.0 / controller-runtime 0.24.0).

Co-authored-by: Cursor <cursoragent@cursor.com>
@ValClarkson ValClarkson enabled auto-merge (rebase) May 13, 2026 18:41
…troller-runtime 0.24

The kubernetes group bump to 0.36.0 (CrunchyData#4479) introduced a new
v1.PersistentVolumeClaimConditionType ("Unused") that triggers the
exhaustive linter on the PVC condition switch in volumes.go. Add it
to the existing no-op case alongside the other condition types that
have no bearing on volume resizing.

The bump also surfaced two staticcheck SA1019 deprecation warnings
that block CI on every PR until addressed:

  - controller-runtime 0.24 deprecated scheme.Builder (used by both
    v1 and v1beta1 groupversion_info.go). Migrating to the new
    helper requires restructuring our api packages, so suppress the
    warning for now and leave a TODO via the comment.

  - k8s.io/apimachinery 0.36 deprecated direct access to
    managed.FieldsV1.Raw in favor of GetRawBytes/SetRawBytes. Only
    apply_test.go uses the old field; suppress until the test is
    rewritten against the new helpers.

These exclusions are scoped narrowly via path patterns so other call
sites (if any) still get flagged.

Co-authored-by: Cursor <cursoragent@cursor.com>
@ValClarkson ValClarkson merged commit 198ab46 into CrunchyData:main May 13, 2026
14 of 20 checks passed
ValClarkson added a commit to ValClarkson/postgres-operator that referenced this pull request May 13, 2026
…OTel

Now that the x/net CVE fix (CrunchyData#4481) and the k8s 0.36.0 / controller-runtime
0.24.0 jump (CrunchyData#4479) are on main, this finishes the planned upgrade pass with
patch bumps and the Go toolchain bump:
* Go 1.26.0 -> 1.26.3 (go directive only; e2e CI still installs Go 1.25.x
  for kuttl/chainsaw which depend on testDeps.ModulePath at the older
  toolchain).
* k8s.io/api, apimachinery, client-go 0.36.0 -> 0.36.1
* sigs.k8s.io/controller-runtime 0.24.0 -> 0.24.1
* go.opentelemetry.io/otel{,/sdk,/trace,/metric,/log,/sdk/log,/sdk/metric}
  1.42.0 -> 1.43.0 (and matching otlp/* exporters; stdout* and log* sub-
  modules to v0.19.0 / v1.43.0 / v0.65.0 as appropriate).
* go.opentelemetry.io/contrib/{exporters/autoexport,instrumentation/net/http/
  otelhttp,propagators/autoprop,bridges/prometheus,propagators/{aws,b3,
  jaeger,ot}} 0.67.0/1.42.0 -> 0.68.0/1.43.0.
These are all patch / minor bumps within their respective stable lines.
'go mod tidy', 'go build ./...', 'go vet ./...', 'make generate', and
'golangci-lint run' all pass cleanly with no source changes required.
Supersedes the Dependabot PRs CrunchyData#4475, CrunchyData#4477, CrunchyData#4478 and the older snapshot
of CrunchyData#4483.

Signed-off-by: ValClarkson <valerie.clarkson@crunchydata.com>
ValClarkson added a commit that referenced this pull request May 13, 2026
…OTel

Now that the x/net CVE fix (#4481) and the k8s 0.36.0 / controller-runtime
0.24.0 jump (#4479) are on main, this finishes the planned upgrade pass with
patch bumps and the Go toolchain bump:
* Go 1.26.0 -> 1.26.3 (go directive only; e2e CI still installs Go 1.25.x
  for kuttl/chainsaw which depend on testDeps.ModulePath at the older
  toolchain).
* k8s.io/api, apimachinery, client-go 0.36.0 -> 0.36.1
* sigs.k8s.io/controller-runtime 0.24.0 -> 0.24.1
* go.opentelemetry.io/otel{,/sdk,/trace,/metric,/log,/sdk/log,/sdk/metric}
  1.42.0 -> 1.43.0 (and matching otlp/* exporters; stdout* and log* sub-
  modules to v0.19.0 / v1.43.0 / v0.65.0 as appropriate).
* go.opentelemetry.io/contrib/{exporters/autoexport,instrumentation/net/http/
  otelhttp,propagators/autoprop,bridges/prometheus,propagators/{aws,b3,
  jaeger,ot}} 0.67.0/1.42.0 -> 0.68.0/1.43.0.
These are all patch / minor bumps within their respective stable lines.
'go mod tidy', 'go build ./...', 'go vet ./...', 'make generate', and
'golangci-lint run' all pass cleanly with no source changes required.
Supersedes the Dependabot PRs #4475, #4477, #4478 and the older snapshot
of #4483.

Signed-off-by: ValClarkson <valerie.clarkson@crunchydata.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants